Dmitry Gryaznov McAfee
The presentation will discuss the challenges associated with terminating hidden processes. It is composed of three parts:
Part I: is a technical background that covers:
Part II: discuss the rootkits challenge:
Part III: is a live demo on the kernel debugger showing all of the things discussed in the presentation.